Wireless secrecy in cellular systems with infrastructure-aided cooperation
IEEE Transactions on Information Forensics and Security
Relay selection for secure cooperative networks with jamming
IEEE Transactions on Wireless Communications
Improving wireless physical layer security via cooperating relays
IEEE Transactions on Signal Processing
Mutual Information Jammer-Relay Games
IEEE Transactions on Information Forensics and Security
Identity-based key management in mobile ad hoc networks: techniques and applications
IEEE Wireless Communications
Cooperative Communications with Outage-Optimal Opportunistic Relaying
IEEE Transactions on Wireless Communications
Selection Cooperation in Multi-Source Cooperative Networks
IEEE Transactions on Wireless Communications
Cooperative communications with relay-selection: when to cooperate and whom to cooperate with?
IEEE Transactions on Wireless Communications
Broadcast channels with confidential messages
IEEE Transactions on Information Theory
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
IEEE Transactions on Information Theory
Towards the Optimal Amplify-and-Forward Cooperative Diversity Scheme
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
The Relay–Eavesdropper Channel: Cooperation for Secrecy
IEEE Transactions on Information Theory
Hi-index | 0.00 |
This paper presents different relay and jammer selection schemes for one-way cooperative networks to increase the security against malicious eavesdroppers. We consider a single source-destination cooperative network with multiple intermediate nodes and one or more eavesdroppers. The selection in the proposed schemes is made with the presence of direct links and the assumption that the broadcast phase is unsecured. The proposed schemes select three intermediate nodes. The first selected node operates in the conventional relay mode and assists the source to deliver its data to the corresponding destination via a Decode-and-Forward strategy. The second and third selected nodes are used in different communication phases as jammers to create intentional interference at the eavesdroppers' nodes. Moreover, a hybrid scheme which switches between jamming and non-jamming modes is introduced in this paper. The proposed schemes are analyzed in terms of ergodic secrecy capacity and secrecy outage probability. Extensive analysis and a set of simulation results are presented to demonstrate the effectiveness of the different schemes presented in this work. The obtained results show that the proposed schemes with jamming outperform the conventional non-jamming schemes and the hybrid switching scheme further improves the secrecy capacity. The impact of changing both the eavesdroppers and the relays location on ergodic secrecy capacity and secrecy outage probability is also discussed. Finally, the impact of the presence of multiple eavesdroppers is studied in this paper.